Cybersecurity Personally Identifiable Information

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

SEC Cyber Update: Official Outlines Active Role for SEC on Cybersecurity as Enforcement Questions Persist

SEC Chicago Regional Director David Glockner spoke at a PLI Conference in New York on June 6 regarding the SEC’s data security regulations and enforcement efforts. Mr. Glockner acknowledged frustration with the Division of...more

Another One Bites the Dust: Maryland Federal District Court Dismisses Putative Data Breach Class Action for Lack of Standing

The United States District Court of Maryland recently dismissed a putative class action alleging that CareFirst’s failure to adequately secure the computer hardware storing their customers’ personal information led to two...more

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

DHS and DOJ Release Updated Guidance for Sharing Cyber Threat Indicators and Defensive Measures

On June 15, in response to feedback from non-federal entities on guidance released in February, the Departments of Homeland Security (DHS) and Justice (DOJ) issued updated guidance for companies about sharing cyber threat...more

Illinois Joins the Fray: Strengthens its Laws Around Data Breach Notification and Data Security

Sophisticated phishing scams and muscular hacking efforts continue to compromise personal and sensitive information held by insurers, hospital systems, and businesses large and small. In response, many states have...more

Tennessee Legislature Amends Data Breach Notification Statute - Encryption is No Longer an Automatic Safe Harbor

On March 24, 2016, Governor Haslam signed S.B. 2005 which amends Tennessee's data breach notice statute. The amended statute will go into effect on July 1, 2016. The new Tennessee breach notice requirements are triggered by...more

Final MNvest Rules Adopted

On June 13, the final administrative rules implementing the MNvest intra-state crowdfunding exemption were adopted. The MNvest Rules were first proposed back in November of 2015. Yesterday's publication in the Minnesota...more

Morgan Stanley Hit With $1 Million Fine In SEC Cybersecurity Enforcement Action

On June 8, 2016, the SEC announced that Morgan Stanley Smith Barney LLC ("MSSB") has agreed to pay a $1 million penalty to settle an enforcement action. The enforcement action is based on the charge that MSSB failed to adopt...more

Colorado Law Protects Student Information, Boosts Cybersecurity Resources

Colorado Governor John Hickenlooper has signed into law two bills implementing enhanced protections and obligations for entities handling student personally identifiable information and increasing state resources dedicated to...more

Your daily dose of financial news - The Brief – 6.10.16

More thoughts on the Department of Labor’s new retirement adviser fiduciary duty standard, including questions about the “grassroots” movement the US Chamber of Commerce is claiming to support its opposition to the standard....more

Illinois strengthens, expands scope of personal information protections

With the passage of the Illinois Personal Information Protection Act (HB1260) last month, Illinois substantially broadened the definition of personally identifiable information, and imposed requirements on data collectors for...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance (updated for 2016)

The attached chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications....more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

Rocky Mountain Securities Conference: Cybersecurity Takes Center Stage

Given the security industry’s increased use of information technology and the constant evolution of cyber threats, cybersecurity will continue to demand significant attention from regulators and industry participants in the...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

Continuing Data Security Lessons from the SEC

In September, we reported that the Securities and Exchange Commission (SEC) settled charges against a registered investment adviser for a violation of Rule 30(a) of Regulation S-P (17 C.F.R. 248.30(a))(“Safeguards Rule”) for...more

Employers Face Exposure for Cyberbreaches

A newly filed lawsuit in California and a recent decision from the U.S. Court of Appeals for the Seventh Circuit serve as reminders to employers that the protection of sensitive employee information from cyberthreats remains...more

Tennessee Gives Businesses 45 Days for Data Breach Notice

Recent amendments to the State’s data breach statute give a hard deadline for a business to provide consumer notice, removes encryption safe harbor, exempts entities that are subject to the Health Insurance Portability and...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

O’ Really, Canada? Data Breach Log Rules Underway

In June 2015, Canada made significant amendments to its data privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA).  These amendments to PIPEDA will require businesses to inform the Canadian...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Feds identify security vulnerabilities in state healthcare exchange websites

A Government Accountability Office (GAO) examination of the state-run health insurance exchanges for California, Kentucky and Vermont identified inadequate security measures in place to protect consumers’ personal...more

They Can Be Heroes: The FCC Proposes Expansive and Detailed Privacy & Cybersecurity Regulations for Broadband ISP

On April 1, 2016, the FCC released a Notice of Proposed Rulemaking (“NPRM”) that would impose new regulatory burdens on broadband Internet service providers’ use of customer data. The wide-ranging NPRM also proposes rules...more

354 Results
|
View per page
Page: of 15
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×